* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
* Features coverage of the recently revised IETF IDS specification
* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
* Provides step-by-step instructions for configuration procedures
"synopsis" may belong to another edition of this title.
TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.
Your in-depth guide to implementing and optimizing an effective intrusion detection system for your network
Here's the in-the-trenches handbook you've been looking for, loaded with information and tips from real case studies that will help you deploy, configure, and monitor an effective intrusion detection system. Step-by-step instructions guide you through the process of configuring identification and authentication, mandatory and discretionary access control, physical security, and more. You'll get practical knowledge of honeynets, IP and MAC addressing, log analysis, and IDS standards, and learn to manage network traffic volume in the IDS.
Tim Crothers gives you the benefit of his own extensive experience, furnishing sample IDS deployments and professional tips that boost your efficiency. If you're responsible for network security, this is the guidebook that will help you get a good night's sleep-at last.
You'll learn how to:
* Implement an effective IDS for host, network, and combined systems
* Understand challenges like evasion, unknown attacks, and false alerts
* Verify, test, and fine-tune intrusion detection systems
* Analyze various IDS products and determine what meets your organization's needs
* Cope with legal issues and architectural challenges
* Identify, verify, and respond to different types of attacks and alerts
* Investigate security breaches and prevent recurrences
Your in-depth guide to implementing and optimizing an effective intrusion detection system for your network
Here's the in-the-trenches handbook you've been looking for, loaded with information and tips from real case studies that will help you deploy, configure, and monitor an effective intrusion detection system. Step-by-step instructions guide you through the process of configuring identification and authentication, mandatory and discretionary access control, physical security, and more. You'll get practical knowledge of honeynets, IP and MAC addressing, log analysis, and IDS standards, and learn to manage network traffic volume in the IDS.
Tim Crothers gives you the benefit of his own extensive experience, furnishing sample IDS deployments and professional tips that boost your efficiency. If you're responsible for network security, this is the guidebook that will help you get a good night's sleep-at last.
You'll learn how to:
* Implement an effective IDS for host, network, and combined systems
* Understand challenges like evasion, unknown attacks, and false alerts
* Verify, test, and fine-tune intrusion detection systems
* Analyze various IDS products and determine what meets your organization's needs
* Cope with legal issues and architectural challenges
* Identify, verify, and respond to different types of attacks and alerts
* Investigate security breaches and prevent recurrences
"About this title" may belong to another edition of this title.
£ 4.46 shipping from U.S.A. to United Kingdom
Destination, rates & speedsSeller: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condition: Fair. 1. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Seller Inventory # 0764549499-7-1
Quantity: 1 available
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 1.2. Seller Inventory # G0764549499I5N00
Quantity: 1 available
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 1.2. Seller Inventory # G0764549499I5N00
Quantity: 1 available
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.2. Seller Inventory # G0764549499I4N00
Quantity: 1 available
Seller: Shakespeare Book House, Rockford, IL, U.S.A.
Condition: Acceptable. Item in acceptable condition including possible liquid damage. As well answers may be filled in. May be missing DVDs, CDs, Access code, etc. 100%Money-Back Guarantee! Ship within 24 hours!! Seller Inventory # 570W2K00000L_ns
Quantity: 1 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 628354
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 628354-n
Quantity: Over 20 available
Seller: CitiRetail, Stevenage, United Kingdom
Paperback. Condition: new. Paperback. * Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective * Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS * Features coverage of the recently revised IETF IDS specification * Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling * Provides step-by-step instructions for configuration procedures Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Offering tips and techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It covers IDS standards, intrusion signatures, log analysis, and incident handling. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability. Seller Inventory # 9780764549496
Quantity: 1 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. New copy - Usually dispatched within 4 working days. 518. Seller Inventory # B9780764549496
Quantity: Over 20 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9780764549496_new
Quantity: Over 20 available